Sciweavers

1594 search results - page 284 / 319
» An Algorithm to Compute Collusion Paths
Sort
View
APLAS
2008
ACM
15 years 1 months ago
Context-Sensitive Relevancy Analysis for Efficient Symbolic Execution
Abstract. Symbolic execution is a flexible and powerful, but computationally expensive technique to detect dynamic behaviors of a program. In this paper, we present a context-sensi...
Xin Li, Daryl Shannon, Indradeep Ghosh, Mizuhito O...
CCS
2008
ACM
15 years 1 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
WSCG
2003
185views more  WSCG 2003»
15 years 1 months ago
Complex 3D Feature Registration Using a Marching Template
The registration of 3D form features is essential to the supporting of reverse shape design processes. Extracting an editable shape feature from unordered data points is notorious...
Joris S. M. Vergeest, Sander Spanjaard, Chensheng ...
ADHOC
2007
126views more  ADHOC 2007»
14 years 12 months ago
Energy-aware routing in sensor networks: A large system approach
In many sensor networking environments, the sensor nodes have limited battery capacity and processing power. Hence, it is imperative to develop solutions that are energy-efficient...
Longbi Lin, Ness B. Shroff, R. Srikant
CORR
2008
Springer
175views Education» more  CORR 2008»
14 years 12 months ago
Energy Aware Self-Organizing Density Management in Wireless Sensor Networks
Energy consumption is the most important factor that determines sensor node lifetime. The optimization of wireless sensor network lifetime targets not only the reduction of energy...
Erwan Le Merrer, Vincent Gramoli, Anne-Marie Kerma...